Cisco ICND1 1.1: Fundamentals of Networking

Overview/DescriptionTo understand how networks function, it is important to gain a basic understanding of the major components of a network. This course introduces fundamental computer and network components, as well as the characteristics, functions, benefits, metrics, and attributes used to characterize features and performance. This course also introduces the Open Systems Interconnection (OSI) and TCP/IP reference models, as well as data communications terms and concepts. Finally, this course introduces the Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) application.

Cisco ICND1 1.1: Network Connections and Communications

Overview/DescriptionData networks, including the Internet, are responsible for supplying reliable, transparent communication for people and applications. Data from applications such as e-mail, web browsers and instant messaging is packaged, transported and delivered to its destination continually. The OSI models Transport layer handles most of the addressing functions for data transmission and is responsible for end-to-end transfer of application data. This course introduces some of the main protocols that operate at the Transport layer, such as TCP, UDP, and ARP and describes the process of packet delivery.

Cisco ICND1 1.1: Switching in LANs

Overview/DescriptionLANs are a relatively low-cost means of sharing expensive resources. LANs allow multiple users in a fairly small geographic area to exchange files and messages, and to access shared resources such as file servers. LANs have rapidly evolved into support systems that are critical to communications within an organization. Properly configured and managed network devices are important tools for the efficient and safe operation of LANs. Cisco IOS Software is a feature-rich network operating system software that provides network intelligence for business-critical solutions. This course describes the challenges that shared LANs face as they confront the increasing need for bandwidth and speed to satisfy the needs of multiple users. This course also introduces the Cisco IOS Software as well as its basic configuration.

Cisco ICND1 1.1: Optimizing and Troubleshooting Switch Security

Overview/DescriptionAfter physical access has been secured, there is growing need to ensure that access to the switch via the console port and the vty ports is secure. In addition, it is important to ensure that unused switch ports do not become a security hole. And as devices are added to LANs to accommodate more users, and more networked software applications require more bandwidth, maintaining an acceptable level of network performance becomes an increasing challenge. There are a number of ways to enhance switched Ethernet LANs to meet the demands of users for performance and availability. This course describes how to secure switch ports as well as several performance-enhancement methods. This course also describes methods for identifying and resolving common switched network issues.

Cisco ICND1 1.1: Implementing Wireless LANs

Overview/DescriptionHistorically, LANs have been limited to physical wired segments. With the advent of technologies that utilized infrared and RF to carry data, LANs were freed from the limitations of a physical media. This course describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access. With the extension of LANs, new types of applications appeared, such as VoIP. This course also briefly describes the main drivers of VoIP implementations on LANs.

Cisco ICND1 1.1: Routing and Cisco Routers

Overview/DescriptionBeyond connecting multiple devices in a network, the networks themselves can be connected. In fact, the Internet is a collection of networks that are connected. The concept of connected networks is a common communication infrastructure in large organizations. Connecting networks with diverse devices, architectures, and protocols requires more sophisticated components than simple LANs. Routers are the devices that are used in this more complex networking environment, and a suite of protocols that is known as TCP/IP governs how data is transmitted. This course describes the functions of routers in connecting networks, and describes how routers transmit data through networks using TCP/IP.

Overview/DescriptionUnderstanding the packet delivery process is a fundamental part of understanding how Cisco networking devices work. Once you have an understanding of how data travels in your network, securing and managing your resources is paramount. This course describes the process of packet delivery and then goes on to discuss data security, particularly how this is handled by Cisco’s Router and Security Device Manager. This course then goes on to describe some of the ways resources are managed, such as DHCP for addressing and the use of remote access tools to perform configuration and maintenance tasks.

Cisco ICND1 1.1: WAN Technologies

Overview/DescriptionWhen sites are located at different geographic locations, a WAN provides interconnections between the sites. There are several types of WANs, including point-to-point leased lines, circuit-switched networks, and packet-switched networks, which are discussed in this course. Routing is the process by which information gets from one location to another. It is important to understand how the various routing protocols determine IP routes. This course describes the features and operation of static routing, default routing, and Routing Information Protocol. As organizations merge, addresses sometimes become limited or addressing conflicts arise. Network Address Translation (NAT) and Port Address Translation (PAT) are two protocols that you can use to address these issues and these protocols are also described in this course.

Cisco ICND1 1.1: WAN Encapsulation and RIP Routing

Overview/DescriptionOne of the most common types of WAN connection is the point-to-point connection. A point-to-point connection is also referred to as a serial connection or leased-line connection, because the lines are leased from a carrier and are dedicated for use by the company leasing the lines. Understanding how point-to-point communication links function to provide access to a WAN is important to an overall understanding of how WANs function. This course describes the protocols that are used to encapsulate both data link layer and network layer information over serial links and how to configure them. This course also describes the basic features and operation of RIP, and explains how to enable RIP on an IP network.

Cisco ICND1 1.1: Managing the Network Environment

Overview/DescriptionThe network staff is responsible for ensuring that the underlying communications infrastructure is capable of supporting business objectives and associated applications. Network staff is also responsible for managing each device on the network according to best industry practices and for reducing device downtime. This course describes commands and processes to determine network operational status; gather information about remote devices; and manage Cisco IOS images, configuration files, and devices on a network.

Cisco ICND1 1.1: LAN Addressing

Overview/DescriptionSubnetworks, also known as subnets, are very common in all but the smallest of network environments. Subnetworks segment the network into smaller divisions that have their own addresses. Each host is represented by a unique IP address, which can be represented in either binary or decimal form for computers and users, respectively. In some cases, some of the bits that are used for the host portion of an IP address are “borrowed” to create the subnet address. The subnet mask defines which part of the IP address represents the network part. This course explains binary numbers and describes how subnets function and how they are computed.

Cisco ICND2 1.1: Implementing VLANS and Trunks

Overview/DescriptionAs small networks grow and become more complex, greater functionality and control over network components (delivered through more sophisticated network devices such as switches and routers) becomes critical. Most Cisco hardware platforms implement Cisco IOS Software, including switches and routers. This software enables network services in Cisco products, including carrying the chosen network protocols and functions; controlling access and prohibiting unauthorized network use; and adding interfaces and capability as needed for network growth. You use the command-line interface (CLI) of the Cisco IOS Software to enter the configuration details into the Cisco switches and routers that implement the network requirements of an organization. This course provides a review of the Cisco IOS command-line interface (CLI) structure and the Cisco IOS commands that are used to create a basic router and switch configuration. A VLAN is a group of end stations with a common set of requirements, independent of their physical location. A VLAN has the same attributes as a physical LAN, except that it lets you group end stations even when they are not physically located on the same LAN segment. A VLAN also lets you group ports on a switch so that you can limit unicast, multicast, and broadcast traffic flooding. Flooded traffic that originates from a particular VLAN floods only to the ports belonging to that VLAN. VLAN trunks with IEEE 802.1Q tagging facilitate interswitch communication with multiple VLANs. Cisco Catalyst switches feature VLAN Trunking Protocol (VTP) to simplify management of VLANs across multiple switches. Understanding the operation of VLANs and the associated protocols is important for configuring, verifying, and troubleshooting VLANs on Cisco access switches. This course also describes VLAN operations and their associated protocols.

Cisco ICND2 1.1: Spanning-Tree Protocol and Inter-VLAN Routing

Overview/DescriptionMost complex networks include redundant devices to avoid single points of failure. Although a redundant topology eliminates some issues, it can introduce other problems. Spanning-Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing undesirable loops in a switched network. This course identifies the problems that are caused by redundant switched-network topologies and the functionality of STP to prevent these problems. Routing is the process of determining where to send data packets that are destined for addresses outside of the local network. Routers gather and maintain routing information to enable the transmission and receipt of data packets. For traffic to cross from one VLAN to another, a Layer 3 process is necessary. This course describes the basics of inter-VLAN routing operations, including subinterfaces and router on a stick.

Cisco ICND2 1.1: Securing and Troubleshooting the Switched Network

Overview/DescriptionSecurity is a major concern, especially in today’s networks, and network administrators must pay close attention to it. Complete network security starts with device-based security on routers and switches. Routers and switches that are internal to an organization often have minimal security configurations. This minimal security renders them targets for malicious attacks. If an attack is launched at Layer 2 on an internal campus device, the rest of the network can be quickly compromised, often without detection. This course discusses security features that exist to protect switches and Layer 2 operations. It is also important to keep in mind that as the number of switch features grows, so does the possibility that things will go wrong. This course also presents recommendations for implementing a functional network. It addresses some of the common reasons that port connectivity, VLAN configuration, VLAN Trunking Protocol (VTP), and Spanning Tree Protocol (STP) can fail. It also describes the information to look for to identify the source of the problem.

Cisco ICND2 1.1: Medium-Sized Routed Network Construction

Overview/DescriptionRouting is the process by which information moves from one location to another. Routers gather and maintain routing information to enable the transmission and receipt of these data packets. Routing information takes the form of entries in a routing table, with one entry for each identified route. The router can use a routing protocol to create and maintain the routing table dynamically so that network changes can be accommodated whenever they occur. To effectively manage an IP network, you must understand the operation of dynamic routing protocols and the impact that they have on an IP network. This course describes the operation and limitations of distance vector and link-state routing protocols. Classless routing protocols scale better than classful routing protocols and the main reason why is that they support Variable-Length Subnet Masks (VLSMs) and route summarization. VLSMs were developed to allow multiple levels of subnetworked IP addresses within a single network. Protocols that have VLSM support include Routing Information Protocol version 2 (RIPv2), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP). VLSM is a key technology on large routed networks and understanding the capabilities of VLSM is important when you are planning large networks. This course describes the capabilities of VLSMs.

Cisco ICND2 1.1: Single-Area OSPF Implementation

Overview/DescriptionOpen Shortest Path First (OSPF) is a classless interior gateway protocol (IGP). It is used within larger autonomous system networks in preference to the legacy distance vector routing protocols. OSPF is designated by the Internet Engineering Task Force (IETF) as one of several IGPs. Because OSPF is a widely deployed standard protocol, knowledge of its configuration and maintenance is essential. This course describes the function of OSPF and explains how to configure a single-area OSPF network on a Cisco router. Because it is a link-state routing protocol, Open Shortest Path First (OSPF) scales well with a growing network. But this scalability introduces complexity in design, configuration, and maintenance. This course also introduces some of the common issues surrounding an OSPF network and a flowchart approach to troubleshooting these issues.

Cisco ICND2 1.1: EIGRP Implementation

Overview/DescriptionEnhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol that was developed by Cisco. EIGRP is suited for many different topologies and media. In a well-designed network, EIGRP scales well and provides extremely quick convergence times with minimal overhead. EIGRP is a popular choice for a routing protocol on Cisco devices. This course describes how to configure and monitor EIGRP. As an advanced distance vector routing protocol, Enhanced Interior Gateway Routing Protocol (EIGRP) scales well with a growing network. But this scalability introduces complexity in design, configuration, and maintenance. This course introduces some of the common problems surrounding an EIGRP network and a flowchart approach to troubleshooting these problems.

Cisco ICND2 1.1: Introducing ACL Operation

Overview/DescriptionAccess control is very important within any organization and once you understand the uses of Access Control Lists (ACLs), you can determine how to implement them on your Cisco network. Using ACLs, you can apply a number of features to the classified packets, such as encryption, policy-based routing, Quality of Service (QoS), Network Address Translation (NAT), and Port Address Translation (PAT). This course describes some of the applications for ACLs on Cisco networks, identifies the different types of ACLs that can be implemented, and explains how Cisco IOS Software processes ACLs.

Cisco ICND2 1.1: Configuring and Troubleshooting ACLs

Overview/DescriptionStandard and extended Cisco IOS access control lists (ACLs) can be used to classify IP packets. Using ACLs, you can apply a number of features to the classified packets, such as encryption, policy-based routing, quality of service (QoS), Network Address Translation (NAT), and Port Address Translation (PAT). You can also configure standard and extended Cisco IOS ACLs on router interfaces for access control (security). Cisco IOS features are applied on interfaces for specific directions (inbound versus outbound). This course describes the steps that you use to configure named and numbered, standard, and extended access control lists (ACLs). This course also explains how to verify that the ACLs are functioning properly, and discusses some common configuration errors to avoid.

Cisco ICND2 1.1: Scaling the Network with NAT and PAT

Overview/DescriptionTwo Internet scalability challenges are the depletion of registered IP version 4 (IPv4) address space and scaling in routing. Network Address Translation (NAT) and Port Address Translation (PAT) are mechanisms for conserving registered IPv4 addresses in large networks and simplifying IPv4 address management tasks. NAT and PAT translate IPv4 addresses within private internal networks to legal IPv4 addresses for transport over public external networks, such as the Internet, without requiring a registered subnet address. Incoming traffic is translated back for delivery within the inside network. This translation of IPv4 addresses eliminates the need for host renumbering and allows the same IPv4 address range to be used in multiple intranets. This course describes the features that NAT and PAT offer and shows you how to configure NAT and PAT on Cisco routers.

Cisco ICND2 1.1: Transitioning to IPv6

Overview/DescriptionThe ability to scale networks for future demands requires a limitless supply of IP addresses and improved mobility. To cope with the depletion of IP addresses, several short-term solutions were developed. Two short-term solutions are private addresses and Network Address Translation (NAT). Although private addresses with DHCP and NAT have helped to reduce the need for IP addresses, a more general solution was required. IP version 6 (IPv6) satisfies the increasingly complex requirements of hierarchical addressing that IPv4 does not satisfy. IPv6 uses some different address types that make IPv6 more efficient than IPv4. This course describes the different types of addresses that IPv6 uses and how to assign these addresses. Transitioning to IPv6 from IPv4 deployments can require various techniques, including an autoconfiguration function. Which transition mechanism you will use depends on the needs of your network. This course describes the different types of transition mechanisms for an IPv6 network.

Cisco ICND2 1.1: VPN and Point-to-Point WAN Connections

Overview/DescriptionCisco virtual private network (VPN) solutions provide an Internet-based WAN infrastructure for connecting branch offices, home offices, business partner sites, and remote telecommuters to all or portions of a company network. With cost-effective, high-bandwidth Internet connectivity that is secured by encrypted VPN tunnels, you can reduce WAN bandwidth costs while increasing connectivity speeds. By integrating advanced network intelligence and routing, Cisco VPNs reliably transport complex mission-critical traffic, such as voice and client-server applications, without compromising communications quality or security. This course describes the uses of VPNs for site-to-site and remote-user access and the benefits of VPN implementations and the underlying hardware, software, and protocols that are required to configure a VPN solution are also covered. One of the most common types of WAN connection is the point-to-point connection. Point-to- point connections are used to connect LANs to service provider WANs, and to connect LAN segments within an enterprise network. A LAN-to-WAN point-to-point connection is also referred to as a serial connection or leased-line connection. Wide-area networking services are typically leased from a service provider. Some WAN services operate as Layer 2 connections between your remote locations and are typically provided by a telephone company (telco) provider over its WAN switches. Point-to-Point Protocol (PPP) emerged as an encapsulation protocol for transporting IP traffic over point-to-point (leased line) serial connections. PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. This course describes the operation, configuration, and verification of PPP.

Cisco ICND2 1.1: Frame Relay Connections

Overview/DescriptionFrame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. It was standardized by the ITU-T. Frame Relay was one of the most extensively used WAN protocols, primarily because it was inexpensive compared to dedicated lines. In addition, configuring user equipment in a Frame Relay network is very simple. This course describes Frame Relay operation, configuration, and troubleshooting. A Frame Relay network offers a few additional benefits that a leased-line implementation does not offer. But with these benefits comes a bit more complexity. The addition of concepts such as Non-broadcast Multiple Access (NBMA), Local Management Interface (LMI), Inverse Address Resolution Protocol (ARP), and Frame Relay maps require that an administrator has a fundamental knowledge of these concepts to better troubleshoot connectivity issues that may arise. This course describes the basic steps that are used to troubleshoot a Frame Relay WAN. How to identify and resolve the most common Frame Relay connectivity issues are also covered.

Cisco CCNA Composite Exam 640-802 Curriculum Outline

Cisco ICND1 1.1: Fundamentals of Networking

Overview/DescriptionTo understand how networks function, it is important to gain a basic understanding of the major components of a network. This course introduces fundamental computer and network components, as well as the characteristics, functions, benefits, metrics, and attributes used to characterize features and performance. This course also introduces the Open Systems Interconnection (OSI) and TCP/IP reference models, as well as data communications terms and concepts. Finally, this course introduces the Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) application.

Cisco ICND1 1.1: Network Connections and Communications

Overview/DescriptionData networks, including the Internet, are responsible for supplying reliable, transparent communication for people and applications. Data from applications such as e-mail, web browsers and instant messaging is packaged, transported and delivered to its destination continually. The OSI models Transport layer handles most of the addressing functions for data transmission and is responsible for end-to-end transfer of application data. This course introduces some of the main protocols that operate at the Transport layer, such as TCP, UDP, and ARP and describes the process of packet delivery.

Cisco ICND1 1.1: Switching in LANs

Overview/DescriptionLANs are a relatively low-cost means of sharing expensive resources. LANs allow multiple users in a fairly small geographic area to exchange files and messages, and to access shared resources such as file servers. LANs have rapidly evolved into support systems that are critical to communications within an organization. Properly configured and managed network devices are important tools for the efficient and safe operation of LANs. Cisco IOS Software is a feature-rich network operating system software that provides network intelligence for business-critical solutions. This course describes the challenges that shared LANs face as they confront the increasing need for bandwidth and speed to satisfy the needs of multiple users. This course also introduces the Cisco IOS Software as well as its basic configuration.

Cisco ICND1 1.1: Optimizing and Troubleshooting Switch Security

Overview/DescriptionAfter physical access has been secured, there is growing need to ensure that access to the switch via the console port and the vty ports is secure. In addition, it is important to ensure that unused switch ports do not become a security hole. And as devices are added to LANs to accommodate more users, and more networked software applications require more bandwidth, maintaining an acceptable level of network performance becomes an increasing challenge. There are a number of ways to enhance switched Ethernet LANs to meet the demands of users for performance and availability. This course describes how to secure switch ports as well as several performance-enhancement methods. This course also describes methods for identifying and resolving common switched network issues.

Cisco ICND1 1.1: Implementing Wireless LANs

Overview/DescriptionHistorically, LANs have been limited to physical wired segments. With the advent of technologies that utilized infrared and RF to carry data, LANs were freed from the limitations of a physical media. This course describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access. With the extension of LANs, new types of applications appeared, such as VoIP. This course also briefly describes the main drivers of VoIP implementations on LANs.

Cisco ICND1 1.1: Routing and Cisco Routers

Overview/DescriptionBeyond connecting multiple devices in a network, the networks themselves can be connected. In fact, the Internet is a collection of networks that are connected. The concept of connected networks is a common communication infrastructure in large organizations. Connecting networks with diverse devices, architectures, and protocols requires more sophisticated components than simple LANs. Routers are the devices that are used in this more complex networking environment, and a suite of protocols that is known as TCP/IP governs how data is transmitted. This course describes the functions of routers in connecting networks, and describes how routers transmit data through networks using TCP/IP.

Cisco ICND1 1.1: LAN Addressing

Overview/DescriptionSubnetworks, also known as subnets, are very common in all but the smallest of network environments. Subnetworks segment the network into smaller divisions that have their own addresses. Each host is represented by a unique IP address, which can be represented in either binary or decimal form for computers and users, respectively. In some cases, some of the bits that are used for the host portion of an IP address are “borrowed” to create the subnet address. The subnet mask defines which part of the IP address represents the network part. This course explains binary numbers and describes how subnets function and how they are computed.

Overview/DescriptionUnderstanding the packet delivery process is a fundamental part of understanding how Cisco networking devices work. Once you have an understanding of how data travels in your network, securing and managing your resources is paramount. This course describes the process of packet delivery and then goes on to discuss data security, particularly how this is handled by Cisco’s Router and Security Device Manager. This course then goes on to describe some of the ways resources are managed, such as DHCP for addressing and the use of remote access tools to perform configuration and maintenance tasks.

Cisco ICND1 1.1: WAN Technologies

Overview/DescriptionWhen sites are located at different geographic locations, a WAN provides interconnections between the sites. There are several types of WANs, including point-to-point leased lines, circuit-switched networks, and packet-switched networks, which are discussed in this course. Routing is the process by which information gets from one location to another. It is important to understand how the various routing protocols determine IP routes. This course describes the features and operation of static routing, default routing, and Routing Information Protocol. As organizations merge, addresses sometimes become limited or addressing conflicts arise. Network Address Translation (NAT) and Port Address Translation (PAT) are two protocols that you can use to address these issues and these protocols are also described in this course.

Cisco ICND1 1.1: WAN Encapsulation and RIP Routing

Overview/DescriptionOne of the most common types of WAN connection is the point-to-point connection. A point-to-point connection is also referred to as a serial connection or leased-line connection, because the lines are leased from a carrier and are dedicated for use by the company leasing the lines. Understanding how point-to-point communication links function to provide access to a WAN is important to an overall understanding of how WANs function. This course describes the protocols that are used to encapsulate both data link layer and network layer information over serial links and how to configure them. This course also describes the basic features and operation of RIP, and explains how to enable RIP on an IP network.

Cisco ICND1 1.1: Managing the Network Environment

Overview/DescriptionThe network staff is responsible for ensuring that the underlying communications infrastructure is capable of supporting business objectives and associated applications. Network staff is also responsible for managing each device on the network according to best industry practices and for reducing device downtime. This course describes commands and processes to determine network operational status; gather information about remote devices; and manage Cisco IOS images, configuration files, and devices on a network.

Cisco ICND2 1.1: Implementing VLANS and Trunks

Overview/DescriptionAs small networks grow and become more complex, greater functionality and control over network components (delivered through more sophisticated network devices such as switches and routers) becomes critical. Most Cisco hardware platforms implement Cisco IOS Software, including switches and routers. This software enables network services in Cisco products, including carrying the chosen network protocols and functions; controlling access and prohibiting unauthorized network use; and adding interfaces and capability as needed for network growth. You use the command-line interface (CLI) of the Cisco IOS Software to enter the configuration details into the Cisco switches and routers that implement the network requirements of an organization. This course provides a review of the Cisco IOS command-line interface (CLI) structure and the Cisco IOS commands that are used to create a basic router and switch configuration. A VLAN is a group of end stations with a common set of requirements, independent of their physical location. A VLAN has the same attributes as a physical LAN, except that it lets you group end stations even when they are not physically located on the same LAN segment. A VLAN also lets you group ports on a switch so that you can limit unicast, multicast, and broadcast traffic flooding. Flooded traffic that originates from a particular VLAN floods only to the ports belonging to that VLAN. VLAN trunks with IEEE 802.1Q tagging facilitate interswitch communication with multiple VLANs. Cisco Catalyst switches feature VLAN Trunking Protocol (VTP) to simplify management of VLANs across multiple switches. Understanding the operation of VLANs and the associated protocols is important for configuring, verifying, and troubleshooting VLANs on Cisco access switches. This course also describes VLAN operations and their associated protocols.

Cisco ICND2 1.1: Spanning-Tree Protocol and Inter-VLAN Routing

Overview/DescriptionMost complex networks include redundant devices to avoid single points of failure. Although a redundant topology eliminates some issues, it can introduce other problems. Spanning-Tree Protocol (STP) is a Layer 2 link management protocol that provides path redundancy while preventing undesirable loops in a switched network. This course identifies the problems that are caused by redundant switched-network topologies and the functionality of STP to prevent these problems. Routing is the process of determining where to send data packets that are destined for addresses outside of the local network. Routers gather and maintain routing information to enable the transmission and receipt of data packets. For traffic to cross from one VLAN to another, a Layer 3 process is necessary. This course describes the basics of inter-VLAN routing operations, including subinterfaces and router on a stick.

Cisco ICND2 1.1: Securing and Troubleshooting the Switched Network

Overview/DescriptionSecurity is a major concern, especially in today’s networks, and network administrators must pay close attention to it. Complete network security starts with device-based security on routers and switches. Routers and switches that are internal to an organization often have minimal security configurations. This minimal security renders them targets for malicious attacks. If an attack is launched at Layer 2 on an internal campus device, the rest of the network can be quickly compromised, often without detection. This course discusses security features that exist to protect switches and Layer 2 operations. It is also important to keep in mind that as the number of switch features grows, so does the possibility that things will go wrong. This course also presents recommendations for implementing a functional network. It addresses some of the common reasons that port connectivity, VLAN configuration, VLAN Trunking Protocol (VTP), and Spanning Tree Protocol (STP) can fail. It also describes the information to look for to identify the source of the problem.

Cisco ICND2 1.1: Medium-Sized Routed Network Construction

Overview/DescriptionRouting is the process by which information moves from one location to another. Routers gather and maintain routing information to enable the transmission and receipt of these data packets. Routing information takes the form of entries in a routing table, with one entry for each identified route. The router can use a routing protocol to create and maintain the routing table dynamically so that network changes can be accommodated whenever they occur. To effectively manage an IP network, you must understand the operation of dynamic routing protocols and the impact that they have on an IP network. This course describes the operation and limitations of distance vector and link-state routing protocols. Classless routing protocols scale better than classful routing protocols and the main reason why is that they support Variable-Length Subnet Masks (VLSMs) and route summarization. VLSMs were developed to allow multiple levels of subnetworked IP addresses within a single network. Protocols that have VLSM support include Routing Information Protocol version 2 (RIPv2), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP). VLSM is a key technology on large routed networks and understanding the capabilities of VLSM is important when you are planning large networks. This course describes the capabilities of VLSMs.

Cisco ICND2 1.1: Single-Area OSPF Implementation

Overview/DescriptionOpen Shortest Path First (OSPF) is a classless interior gateway protocol (IGP). It is used within larger autonomous system networks in preference to the legacy distance vector routing protocols. OSPF is designated by the Internet Engineering Task Force (IETF) as one of several IGPs. Because OSPF is a widely deployed standard protocol, knowledge of its configuration and maintenance is essential. This course describes the function of OSPF and explains how to configure a single-area OSPF network on a Cisco router. Because it is a link-state routing protocol, Open Shortest Path First (OSPF) scales well with a growing network. But this scalability introduces complexity in design, configuration, and maintenance. This course also introduces some of the common issues surrounding an OSPF network and a flowchart approach to troubleshooting these issues.

Cisco ICND2 1.1: EIGRP Implementation

Overview/DescriptionEnhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol that was developed by Cisco. EIGRP is suited for many different topologies and media. In a well-designed network, EIGRP scales well and provides extremely quick convergence times with minimal overhead. EIGRP is a popular choice for a routing protocol on Cisco devices. This course describes how to configure and monitor EIGRP. As an advanced distance vector routing protocol, Enhanced Interior Gateway Routing Protocol (EIGRP) scales well with a growing network. But this scalability introduces complexity in design, configuration, and maintenance. This course introduces some of the common problems surrounding an EIGRP network and a flowchart approach to troubleshooting these problems.

Cisco ICND2 1.1: Introducing ACL Operation

Overview/DescriptionAccess control is very important within any organization and once you understand the uses of Access Control Lists (ACLs), you can determine how to implement them on your Cisco network. Using ACLs, you can apply a number of features to the classified packets, such as encryption, policy-based routing, Quality of Service (QoS), Network Address Translation (NAT), and Port Address Translation (PAT). This course describes some of the applications for ACLs on Cisco networks, identifies the different types of ACLs that can be implemented, and explains how Cisco IOS Software processes ACLs.

Cisco ICND2 1.1: Configuring and Troubleshooting ACLs

Overview/DescriptionStandard and extended Cisco IOS access control lists (ACLs) can be used to classify IP packets. Using ACLs, you can apply a number of features to the classified packets, such as encryption, policy-based routing, quality of service (QoS), Network Address Translation (NAT), and Port Address Translation (PAT). You can also configure standard and extended Cisco IOS ACLs on router interfaces for access control (security). Cisco IOS features are applied on interfaces for specific directions (inbound versus outbound). This course describes the steps that you use to configure named and numbered, standard, and extended access control lists (ACLs). This course also explains how to verify that the ACLs are functioning properly, and discusses some common configuration errors to avoid.

Cisco ICND2 1.1: Scaling the Network with NAT and PAT

Overview/DescriptionTwo Internet scalability challenges are the depletion of registered IP version 4 (IPv4) address space and scaling in routing. Network Address Translation (NAT) and Port Address Translation (PAT) are mechanisms for conserving registered IPv4 addresses in large networks and simplifying IPv4 address management tasks. NAT and PAT translate IPv4 addresses within private internal networks to legal IPv4 addresses for transport over public external networks, such as the Internet, without requiring a registered subnet address. Incoming traffic is translated back for delivery within the inside network. This translation of IPv4 addresses eliminates the need for host renumbering and allows the same IPv4 address range to be used in multiple intranets. This course describes the features that NAT and PAT offer and shows you how to configure NAT and PAT on Cisco routers.

Cisco ICND2 1.1: Transitioning to IPv6

Overview/DescriptionThe ability to scale networks for future demands requires a limitless supply of IP addresses and improved mobility. To cope with the depletion of IP addresses, several short-term solutions were developed. Two short-term solutions are private addresses and Network Address Translation (NAT). Although private addresses with DHCP and NAT have helped to reduce the need for IP addresses, a more general solution was required. IP version 6 (IPv6) satisfies the increasingly complex requirements of hierarchical addressing that IPv4 does not satisfy. IPv6 uses some different address types that make IPv6 more efficient than IPv4. This course describes the different types of addresses that IPv6 uses and how to assign these addresses. Transitioning to IPv6 from IPv4 deployments can require various techniques, including an autoconfiguration function. Which transition mechanism you will use depends on the needs of your network. This course describes the different types of transition mechanisms for an IPv6 network.

Cisco ICND2 1.1: VPN and Point-to-Point WAN Connections

Overview/DescriptionCisco virtual private network (VPN) solutions provide an Internet-based WAN infrastructure for connecting branch offices, home offices, business partner sites, and remote telecommuters to all or portions of a company network. With cost-effective, high-bandwidth Internet connectivity that is secured by encrypted VPN tunnels, you can reduce WAN bandwidth costs while increasing connectivity speeds. By integrating advanced network intelligence and routing, Cisco VPNs reliably transport complex mission-critical traffic, such as voice and client-server applications, without compromising communications quality or security. This course describes the uses of VPNs for site-to-site and remote-user access and the benefits of VPN implementations and the underlying hardware, software, and protocols that are required to configure a VPN solution are also covered. One of the most common types of WAN connection is the point-to-point connection. Point-to- point connections are used to connect LANs to service provider WANs, and to connect LAN segments within an enterprise network. A LAN-to-WAN point-to-point connection is also referred to as a serial connection or leased-line connection. Wide-area networking services are typically leased from a service provider. Some WAN services operate as Layer 2 connections between your remote locations and are typically provided by a telephone company (telco) provider over its WAN switches. Point-to-Point Protocol (PPP) emerged as an encapsulation protocol for transporting IP traffic over point-to-point (leased line) serial connections. PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. This course describes the operation, configuration, and verification of PPP.

Cisco ICND2 1.1: Frame Relay Connections

Overview/DescriptionFrame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. It was standardized by the ITU-T. Frame Relay was one of the most extensively used WAN protocols, primarily because it was inexpensive compared to dedicated lines. In addition, configuring user equipment in a Frame Relay network is very simple. This course describes Frame Relay operation, configuration, and troubleshooting. A Frame Relay network offers a few additional benefits that a leased-line implementation does not offer. But with these benefits comes a bit more complexity. The addition of concepts such as Non-broadcast Multiple Access (NBMA), Local Management Interface (LMI), Inverse Address Resolution Protocol (ARP), and Frame Relay maps require that an administrator has a fundamental knowledge of these concepts to better troubleshoot connectivity issues that may arise. This course describes the basic steps that are used to troubleshoot a Frame Relay WAN. How to identify and resolve the most common Frame Relay connectivity issues are also covered.

Cisco CCNA™ Certification
(Cisco Certified Network Associate)

The Cisco CCNA (Cisco Certified Network Associate) validates the ability to install, configure, operate, and troubleshoot medium-size
route and switched networks, including implementation and verification of connections to remote sites in a WAN. Cisco CCNA training
includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based
skills. This Cisco CCNA training also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing
Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access
control lists (ACLs).

Benefits of CBT Direct’s Online Cisco CCNA Certification Training

CBT Direct boasts the most beneficial online certification training on the market. With online training, you have the flexibility to
study on your schedule, and with the speed and reliability of the internet, CBT Direct’s Cisco CCNA training course is accessible
anywhere you have an internet connection. Convenience finally costs less with CBT Direct – the most affordable online training solution
today. CBT Direct is also a Cisco Registered Partner.

CBT Direct also offers online mentoring for over 100 current major certification exams, including Cisco CCNA, for IT professionals
and end-users alike. CBT Direct’s mentors have a minimum of 20 certifications each and are available 24/7*.* Available for most courses.